article thumbnail

Landmark EU Law Strengthens Cybersecurity of Critical Infrastructures

Palo Alto Networks

The European Union (EU) adopted the revised Network and Information Security Directive (NIS2) in November 2022. It is especially important in a time of growing geopolitical tensions and cyberattacks where European citizens and their economies depend on a stable and secure digital infrastructure.

article thumbnail

Keep the Water Flowing for the DoD: Securing Operational Technology from Cyberattacks

Tenable

Read on to learn how a strong cybersecurity program can help the DoD significantly reduce the cyber risk of its WWS systems. In addition to being attractive targets, these systems are frequently older, lack modern cybersecurity controls and include a range of interconnected systems and technology.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How the new AI executive order stacks up: B-

CIO

The White House’s new executive order, “ Safe, Secure, and Trustworthy Artificial Intelligence ,” is poised to usher in a new era of national AI regulation, focusing on safety and responsibility across the sector. But will it? The executive order represents the U.S. Here are my thoughts regarding its potential implications and effectiveness.

article thumbnail

How new public transportation technology is prioritizing passenger safety

CIO

So it’s not surprising the recent Bipartisan Infrastructure Law earmarked $91 billion in guaranteed funding for public transportation , with priority areas of public safety, climate, transport equity and investing in new public transportation technology.

article thumbnail

Maintaining Voluntary Measures for Critical Infrastructure Cybersecurity Could be Deadly

CTOvision

A water system in Florida has been accessed by an unknown intruder who made an attempt to alter the chemical balances used to treat water in a way that could […].

Chemicals 107
article thumbnail

5 C-suite bridges every IT leader must build

CIO

That’s especially true when functional areas outside IT routinely buy their own technology and hire their own technology professionals, says Irving Tyler, distinguished VP analyst at Gartner, and former CIO of Quaker Chemical and IMS Health. Happily for him, he says, Lewis has no hand in establishing cybersecurity policies.

Security 278
article thumbnail

Critical infrastructure is more vulnerable than ever—your industry could be a prime target

Lacework

One of the only major changes in cybercriminal operations is who their victims are—today, instead of targeting individuals, they’re targeting critical infrastructure. So, why did this shift occur, and which types of critical infrastructure are most at risk? Critical infrastructure is organized into 16 different sectors.